Preview

Professional Issues in Computing

Satisfactory Essays
Open Document
Open Document
1126 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Professional Issues in Computing
Learning Outcome 1: Understand the impact of National and Global legislation involved in computing and information systems development.
Computers and their uses have become pervasive in today's society with new uses occurring on almost a daily basis. In general this use is beneficial; however, as with all technology, computers may be put to the wrong use. In order to safeguard computer users in the UK there are different types of legislation covering the many uses or misuses of Information and Communications Technology (ICT).
Following is the current legislation in computing:
1.1) Computer Misuse Act 1990
1.2) Consumer Protection Act 1987
1.3) Data Protection Act 1998
1.4) Disability Discrimination Act 1995
1.5) Freedom of Information Act 2002
1.6) Health and Safety at Work Act 1974
1.7) Copyright, Designs and Patent Act 1988

Reference: http://www.sqa.org.uk/e-learning/ITLaw01CD/page_01.htm

1.1 Computer Misuse Act
The Computer Misuse Act 1990 was designed to clarify UK law with regards to the intentional malicious use of computers. Many critics of the bill argue that malicious intention can't be readily established or proved. This view is cited because of the case that gave rise to the bill where what the defendants did, could not be classified as "computer crime" but rather as "inappropriate behaviour". The UK Computer Misuse Act 1990 has acted as a blueprint for other countries when designing new laws concerned with computer crime.
Reference: http://www.sqa.org.uk/e-learning/ITLaw01CD/page_02.htm
1.2 Consumer Protection Act
The Consumer Protection Act 1987 is designed to protect consumers and give them rights when buying goods and services, eg manufacturers are legally obliged to put certain information on products, such as health and safety messages on cigarettes.
The act covers a range of issues including fraud, unfair business practice, product liability and many other consumer and business activities. As well as being bound by

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Some legislation relates to security and confidentiality, for example: • • The Data Protection Act 1998 ensures that all employers who process data on individuals are listed in the register of data controllers The Copyright, Designs and Patents Act 1988 protects the rights of people who create original works.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 - P2

    • 1921 Words
    • 6 Pages

    All businesses must ensure that their marketing activities fall within the laws and regulations set up by the authorities, In recent years various organisations have put an emphasis on customer protection and thus many laws and regulations have been introduced; all of these must be followed by businesses. Laws and regulations are constantly changing and it is a business’s responsibility to keep up to date with them or else they will feel the repercussions of disobeying them.…

    • 1921 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Business Admin Nvq 2

    • 3880 Words
    • 16 Pages

    3. Data Protection Act 1998, this deals with confidentiality, storage and access to personal data.…

    • 3880 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    There are different legislations in marketing which protects consumers. So if a costumers is not completely satisfied or feel that the product is harmful in any kind of way they can bring a claim against the person or company that produced the product. Legislation is a term used to describe a law put out by a legislative body. There are two main types of legislations:…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    PTLLS 3

    • 448 Words
    • 2 Pages

    Generic legislation (Data Protection Act, Health and Safety and Work Act) and explain how legislation applies to all workplaces or training centres. For example, “In accordance with the Data Protection Act or Health and Safety at Work Act, training must ensure that they are based on seven behaviours, namely:…

    • 448 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Data Protection Act 1998, Position under common law, The rights of access to information, and The Caldicott principles.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime

    • 7957 Words
    • 32 Pages

    * Csonka Peter, Internet Crime: The Draft Council of Europe Convention on Cybercrime : A Response to the Challenge of Crime in the Age of the Internet…

    • 7957 Words
    • 32 Pages
    Powerful Essays
  • Good Essays

    Cyber Law

    • 821 Words
    • 4 Pages

    1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .…

    • 821 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    thisis

    • 1510 Words
    • 7 Pages

    The ICT programmed also provides various services related to the acquisition, sale, operation and management of a broad spectrum of ICTs in e-commerce, telecommunications, transfer of technology, etc. It also offers advisory services in legislative and policy drafting and analysis of ICT law and policy. The programmed also has undertaken various consultancies in ICT Law, including impact assessment on ICT laws, regulations and policies; monitoring and evaluation of ICT law and policies in Kenya, drafting and analysis of ICT legislation etc.…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyberwar

    • 2001 Words
    • 9 Pages

    Commoditization of technology and efforts facilitating access to the internet has led to unrestricted use of internet by individuals disregarding the negativity it can have on their lives. This decrease in computing technology has created a gap between skilled and non-skilled users, thus leading to cybercrimes. Technology has introduced safeguards as well as vulnerabilities. It poses threats, and there are tools to deal with these threats. The House of Lords Science and Technology Committee analyzed the dangers of the internet to the general public.…

    • 2001 Words
    • 9 Pages
    Powerful Essays